Their stock is already down 35%.You know who's really going to suffer for this? Supermicro.
--Patrick
No, the assertion is that actual spy ICs were substituted/added/embedded on boards during the actual manufacturing process, not after they left the factory (which suggests state-level involvement).This isn't another smokescreen to cover up the announcement that there's yet another un-announced capability in Intel's Management Engine Enabled chips which can allow outside access to your CPU, is it?
Huh, didn't even know about this. Looks like it was one of the things patched in 10.13.5, though (released June 2018).it's starting to leak out that Apple shipped at least some of their laptops with MM enabled, and concerns that there's no way to disable it once the device makes it to the end-user.
I know, I read Bloomberg fear piece - I was more talking about how whenever either Meltdown or Spectre was announced, immediately someone else struck back with "but what about these 6 vulnerabilities in AMD chips?"No, the assertion is that actual spy ICs were substituted/added/embedded on boards during the actual manufacturing process, not after they left the factory (which suggests state-level involvement).
--Patrick
(Quote source)Bloomberg didn't name the company, citing a non-disclosure agreement between the unnamed telecom and the security firm it hired to scan its data centers. AT&T, Sprint and T-Mobile all told Ars they weren't the telecom mentioned in the Bloomberg post. Verizon and CenturyLink also denied finding backdoored Supermicro hardware in their datacenter
And this is why I remain highly sceptical whenever claims like this come out. Every time it's debunked, and (almost) every time it (seems to?) come(s) down to someone wanting to manipulate someone else' stock price.Some of the Internet's heaviest hitters have gone on record:
Amazon, Apple call for retraction of Bloomberg motherboard hacking story
Patrick Kennedy (of ServeTheHome.com) EXHAUSTIVELY demonstrates how implausible their claims are
Mike Masnick (of TechDirt.com) adds his two cents to Patrick's "detailed and thorough debunking" of the story
At this point, it's more likely the headline should read "Servers at Bloomberg.com infiltrated, hackers planted several fake stories," sheesh.
--Patrick
Update #1: Bloomberg still isn't backing down. Security researchers have done experiments just to see if such a thing is possible (spoiler alert: It's definitely possible), but there still have been no instances of compromised motherboards found in the wild.One thing's pretty clear, though...everyone who can afford to has begun the process of moving their manufacturing plants out of China because building your stuff in China is now considered a security hazard.
(excerpted from "China’s New Cybersecurity Program: NO Place to Hide," a China law blog by law firm Harris|Bricken)China’s Ministry of Security [will be able] to fully access the massive amounts of raw data transmitted across [all] Chinese networks and housed on servers in China. [...] It will cover every district, every ministry, every business and other institution, basically covering the whole society. It will also cover all targets that need [cybersecurity] protection, including all networks, information systems, cloud platforms, the internet of things, control systems, big data and mobile internet. [...] No information contained on any server located within China will be exempted from this full coverage program. No communication from or to China will be exempted. There will be no secrets. No VPNs. No private or encrypted messages. No anonymous online accounts. No trade secrets. No confidential data. Any and all data will be available and open to the Chinese government. [...] [all] email and data transfer will be required to use Chinese operated communication systems that are fully open to the China’s Cybersecurity Bureau. All data servers that make any use of Chinese based communications networks will also be required to be open to the Cybersecurity Bureau’s surveillance and monitoring system.